MSC. In Computer Science
Secure Data Communication
E-Voting by using biometrics
Study of using Fingerprints and Iris in e-voting
Presented by: Muna Al-Busaidi.
Student ID:1032796
Presented to: Mr.Ramalingam D.
Answer for question (1) section (A):
Introduction
Biometrics is a technique to verify identity based on the unique physiological characteristic (physical and behavior) of human body such as finger print, iris, voice, DNA, face and signature, that can be identified using computer system where it can be stored in database.
The benefits of using biometrics are listed –but not limited to- the below points: 1. Providing security. 2. Speed in verification of identity. 3. Avoiding/minimizing fraud. 4. High availability.(Ahmed, 2010)
In gulf country the suitable methods for e-voting are: Fingerprint and Iris. “Fingerprint is the cheapest, fastest, most suitable and most reliable way to identify someone. And the tendency, due to scale, easiness and the existing foundation, is that the use of fingerprint will only increase”(Sul, 2011).
Fingerprint scanners are the most commonly used biometric system in the World. It is impossible to duplicate another person 's fingerprint in a form that the scanner will recognize. Fingerprint scanner works as follow: the client scan his finger in the scanner. The scanner automatically read the fingerprint and identifies it by comparing the original fingerprint image with stored templates image in the database. The metrics used in fingerprint-based authentication rely on the relative positions found for the minutiae. There are two facts about fingerprints, first fingerprints never change, second No two fingerprints are identical (Gaensslen, 2001).
“Obviously, iris is a high reliable biometric technology for its stability and the high variation degree between individuals. It has enormous pattern of variability among its different individuals. Unlike DNA and fingerprint, iris is
Bibliography: A.Forouzan, B., 2008. Cryptography & Network Security. new delhi: Tata Mc Graw. Hill campanies. Ahmed, f., 2010. biometrics & infomation security. In 6th annual confeence for saudi library and information association. riyadh , 2010. saudi library and information association. Al-Raisi, A.N. & Al-Khouri, A.M., 2006. Iris recognition and the challenge of homeland and border control security in UAE. Abu Dhabi: Elsevier Ltd. BILAL, M.B., 2000. ‘FAIR’ BPEL PROCESSES TRANSACTION USING NON-REPUDIATION PROTOCOLS. Lahore: University of Engineering & Technology University of Engineering & Technology. Components, i., 2011. OCR Components ICR Components & OMR Components. [Online] [Accessed 30 April 2011]. Gaensslen, H.C.L.a.R.E., ed., 2001. Advances of Fingepint Technology. second edition ed. Boca Raton: CRC Press. imaging components, 2011. OCR Components, ICR Components & OMR Components. [Online] Available at: HYPERLINK "www.imaging-components.com/Imaging-Components" www.imaging-components.com/Imaging-Components [Accessed 30 April 2011]. King, D.S., 2002. Testing Iris and Face Recognition in a Personnel Identification Application. Office of the Deputy Under Secretary of Defense. Kremer, O.M.a.S., n.d. An Optimistic Non-Repudiation Protocol with Transparent Trusted Third Party. 1050 Bruxelles Belgium: Universit¶e Libre de Bruxelles. Microsoft, 2011. Threats and Countermeasures for Web Services. [Online] Available at: HYPERLINK "http://msdn.microsoft.com/en-us/library/cc949001.aspx" http://msdn.microsoft.com/en-us/library/cc949001.aspx [Accessed 12 May 2011]. Sul, S., 2011. Classification-based Automatic Fingerprint Identification System for Large Distributed Fingerprint Database. Biometrics & Biostatistics, p.3. Vigneron, L., 2007. Optimistic Non-Repudiation Protocol Analysis. presentation. Heraklion: LORIA LORIA, Nancy-Universit.